top title background image
flash

SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.15350.rtf

Status: finished
Submission Time: 2021-12-02 21:46:14 +01:00
Malicious
Trojan
Exploiter
Evader
FormBook

Comments

Tags

  • rtf

Details

  • Analysis ID:
    532961
  • API (Web) ID:
    900483
  • Analysis Started:
    2021-12-02 21:46:15 +01:00
  • Analysis Finished:
    2021-12-02 21:57:13 +01:00
  • MD5:
    bdacb3b17f31a06a8cfbedba2342bdf5
  • SHA1:
    9f6930782942ec4bedc162be334b97f861d24f75
  • SHA256:
    16fc1ecc295f8d7dba6647b9aeb8d538932910b24f3affe1853a82ab2c9d944a
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious

IPs

IP Country Detection
50.62.137.48
United States
185.230.63.177
Israel
104.21.39.13
United States
Click to see the 1 hidden entries
162.159.135.233
United States

Domains

Name IP Detection
www.vecydoy.xyz
104.21.39.13
td-balancer-db4-63-177.wixdns.net
185.230.63.177
lillianpsmith.com
50.62.137.48
Click to see the 4 hidden entries
www.marcasemele.com
0.0.0.0
www.lillianpsmith.com
0.0.0.0
google.com
216.58.215.238
cdn.discordapp.com
162.159.135.233

URLs

Name Detection
http://www.vecydoy.xyz/t3t2/?s2MDa=cHQmaRhXG/vngEByS69ZQUNH+JDmxyaQFA1QwuukQiJPteqD3aI5HBNhKJ+idn/6LHxDHg==&aJ=btx8n42x9
www.getyourshoponline.com/t3t2/
http://www.marcasemele.com/t3t2/?s2MDa=3Qj9oZZfewD59ZVrWkdF2G2Wunuif2Jlkx5S2y1tDqrPnVj26TOdvUTbk2/4ZHnYpFjC/w==&aJ=btx8n42x9
Click to see the 32 hidden entries
http://www.lillianpsmith.com/t3t2/?s2MDa=Y2xcL3ZkL7oVFMSzs9YHectEjMd2sfTUB3/xlHaDCcg2Dqhlo8BobNvGWm7cW+r/txQJ1w==&aJ=btx8n42x9
http://www.msn.com/de-de/?ocid=iehp
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
http://java.sun.com
http://www.icra.org/vocabulary/.
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
http://investor.msn.com/
http://www.msn.com/?ocid=iehp
http://www.msn.com/de-de/?ocid=iehpZ
http://www.piriform.com/ccleaner
http://computername/printers/printername/.printer
http://www.%s.comPA
http://www.autoitscript.com/autoit3
https://support.mozilla.org
http://servername/isapibackend.dll
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1)
http://www.windows.com/pctv.
http://schemas.open
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
http://treyresearch.net
http://www.hotmail.com/oe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1LMEM
http://www.iis.fhg.de/audioPA
http://schemas.openformatrg/package/2006/content-t
https://cdn.discordapp.com/attachments/915347845752705109/915799800740462662/mono.jpg
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
http://www.msn.com/?ocid=iehpo
http://wellformedweb.org/CommentAPI/
http://www.msnbc.com/news/ticker.txt
http://investor.msn.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{07064FCF-B986-4FF1-8E5F-48BE8D9FE1ED}.tmp
Composite Document File V2 Document, Cannot read section info
#
C:\Users\user\AppData\Local\Temp\Client.vbs
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\Client.vbs:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mono[1].jpg
ASCII text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{96B102F3-113F-4941-A0F4-82256A0F2293}.tmp
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F053B286-DC2A-4E74-A6C1-CD6052CFBDE3}.tmp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.15350.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 3 04:46:12 2021, mtime=Fri Dec 3 04:46:12 2021, atime=Fri Dec 3 04:46:16 2021, length=2186553, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msar (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A2T3MU44P0BY2HKXPSH0.temp
data
#
C:\Users\user\Desktop\~$curiteInfo.com.Exploit.Rtf.Obfuscated.32.15350.rtf
data
#